无线P2P文件共享系统中若干关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着通信技术和互联网应用的不断发展,传统应用层所采用的服务器/客户端的服务架构已经不能很好满足大量用户的访问需求,出现了许多基于P2P (Peer-to-Peer)技术的商业应用,采用对等通信的思想将网络边缘的用户和终端设备连接起来,提供点到点的直接服务。在P2P技术所构建的应用层虚拟网络中,所有终端都被映射成为对等的节点,同时兼任服务器和客户端的角色,彼此间共享文档数据、存储空间、计算能力等资源,可以实现即时通讯、影音点播、搜索资料、分布式计算等各种娱乐和科研活动,吸引了世界各地的用户加入。其中最受欢迎的是P2P文件共享系统,它允许用户在网络内数以万计的节点所建立起来的丰富资源中寻找所需要的目标文件,同时提供自己的可用资源列表,为他人提供方便,实现互相协助,文件共享。
     人们随时随地接入网络的需求随着无线通信技术的进步逐渐得到满足,相关的应用服务也开始由有线网络向无线网络过渡。现有P2P文件共享系统的设计实现都基于有线网络,要想在无线环境中大规模推广,还需要解决一系列问题,特别是底层传输情况的改变对于上层应用的影响,例如用户终端随机移动,无线链路不可靠,设备能量受限,节点失效风险增加,网络拓扑结构频繁变化等。对此研究人员已经展开探索,取得了大量成果,但是现有研究都集中在资源发现、安全保障、激励措施等热点领域,没有对文件共享的流程进行深入分解讨论,并且所提出的算法对适用环境有所限制,可扩展性较差。本文针对无线P2P文件共享系统所面临的挑战,紧密围绕文件共享的关键步骤展开探讨,既立足于现有研究成果,又充分考虑无线环境,兼顾有效性和可靠性,针对实现共享的主要环节进行逐步分析,提出相应的解决方法。主要的工作和创新点如下:
     1.提出了一种无线P2P文件共享系统的结构模型,通过分层架构对数量庞大的节点进行组织,规定了普通节点和簇头节点的功能、职责,共享文件的存储管理方式,系统初始化和运营维护的相关机制,具有良好的可扩展性和灵活性,支持多关键字和多粒度的模糊搜索。
     2.设计了与上述新型结构模型相配合使用的资源搜索算法,在路由表中引入远端连接,通过人为构建符合小世界特性的网络,将查询消息的转发范围从邻居簇扩大到远端簇,从而极大提高了文件查询的效率,降低了网络开销,改善了系统性能。
     3.提出了适用于无线P2P网络的最优文件持有节点选择标准,即始终协调最优准则,代替传统有线网络中使用的最小跳数准则。全面考虑了无线通信环境中的主要影响因素,可以设置不同的评分细则从而选出符合不同侧重要求的节点。运用模糊信息综合理论建立数学模型,并根据实际情况对算法实现流程进行了设计。该算法能够与各种P2P资源搜索协议配合使用,在文件成功传输率和文件传输时间等方面表现良好。
     4.设计了无线P2P文件传输中对失效路由的恢复机制,通过构建松散的聚群集合,实现对下一跳节点突然失效状况的及时发现和迅速反应。为了确定适合的备用节点,对集合中的所有节点进行周期性的信息收集和失效风险评估。为此引入了模糊认知图理论,分析无线环境下导致节点失效的可能原因和影响程度,建立模型并得到节点失效风险的衡量规则。该机制具有良好的独立性和灵活性,可以与各种传输路径选择算法配合使用,为节点之间顺利完成文件传输提供了保障。
Along with the development of the communication technologies and the prosperity of Internet applications, traditional service providing pattern of Server/Client in application layer could not fulfill massive accessing requirements. Then a series of commercial services based on P2P (peer-to-peer) networks have achieved huge success with equal communicating positions among entities. Users and terminals are connected by virtual links and provided with direct end-to-end serving. They play both server and client roles in the networks to share various kinds of data, storage space, computing capacities and other resources. Depending on P2P, thousands of users all around the world could enjoy instant communication, online movie and music, files searching, distributed computing and many other entertaining and academic activities. The most popular application is P2P files sharing systems, which support looking for target files among numerous databases and encourage abundant users to offer help to others with their own resources.
     Wireless communication technologies make people may access to networks anywhere and anytime. Relative service demand from wireless users has also increased. Existing P2P files sharing systems are all designed for wired networks, which need further revisions to adapt to wireless environment. Underlying transmission condition changes result in obvious influence on upper layers, such as random moving of users, unreliable wireless links, energy-limited terminals, increasing failure risk of nodes and frequent topology changes. Although researchers have proposed many algorithms in wireless P2P area, it mainly focuses on resource discovering, security schemes, incentive methods and other hot fields, lacking thorough analysis on sharing procedure and scalablity. This thesis would concentrate on the key steps of files sharing in wireless P2P system, combining existing research results with wireless transmission environments, proposing effective, flexible and reliable approaches from several important respects. The main contributions of the thesis are listed as follows:
     1. Proposing effective network architecture for wireless P2P files sharing systems. Abundant nodes are organized by hybrid layers, with head nodes and ordinary nodes shouldering respective responsibilities. The shared files are stored in the database for fuzzy and multiple-keys lookup. Relative running and maintaining schemes are also designed for scalable and reliable requirements.
     2. Designing the P2P resource discovering algorithm matching the proposed network architecture. Remote links are introduced into the routing table to construct a man-made small-world network. The looking up request is forwarded not only to neighbor heads, but also to remote clusters. This may greatly improve the files discovering efficiency, decreasing overhead and enhance the system performance.
     3. Proposing the optimal files holder selection criteria used in wireless P2P files sharing systems, always-optimally-coordinated rule (AOC), to replace the traditional min-hops rule designed for wired networks. Based on the through consideration on wireless environment, the new AOC algorithm may adjust the evaluating stress to different cases. Fuzzy knowledge combination theory is introduced to construct the mathematic model, and the concrete procedure of the algorithm is realized. It may adapt to various P2P resource discovering protocols with good improvement on successful transmission rate and files transmission time compared to min-hop-based algorithm.
     4. Designing a novel path failure recovery scheme for wireless files transmission in P2P networks. Loosely-connected groups are organized to realize quick detecting and recovering for failed next-hop nodes. In order to decide the most proper backup node, periodic information collection and failure risk evaluation are carried out by all the nodes in the group. Fuzzy cognitive maps theory is introduced to set up the node failure risk model for wireless P2P files sharing and deduce the evaluating rule. It has been proved that the new scheme could work with various routing protocols to provide successful file transmission among nodes with good scalable and flexible behavior.
引文
[1]Walkerdine J., Hughes D., Rayson P., Simms J., Gilleade K., Mariani J., Sommerville I. A framework for P2P application development. Computer Communications,31(2):387-401, Febrary 5,2008.
    [2]Chu Yanghua, Sanjay G. Rao, Zhang Hui. A case for end system multicast. SIGMETRICS 2000.
    [3]Napster website:http://www. napster.com.
    [4]KaZaa website:http://www. kazaa.com.
    [5]Li Deng, Chen Zhigang, Liu Hui, Vasilakos A. V., Pan Yi. IPBGA:A hybrid P2P based grid architecture by using information pool protocol. Journal of Supercomputing.49(2):159-189, August 2009.
    [6]Qin Yifang, Zhou Xu, Tang Hui. A cross-transmission protocol architecture concept for resource discovery in P2P overlay networks. World Congress on Software Engineering (WCSE 2009),3:134-137,2009.
    [7]Shah P., Paris J., Morgan J., Schettino J., Venkatraman C. A P2P-based architecture for secure software delivery using volunteer assistance. In Proceedings of 8th International Conference on Peer-to-Peer Computing, pp 131-139,2008.
    [8]Que Ying Peng, Boustead Paul, Safaei Farzad. Scalable delivery of Immersive Communication Environment (ICE) using Peer-to-Peer (P2P) architecture. IEEE Global Telecommunications Conference,2007.
    [9]Lu Mengting, Wu Juichieh, Peng Kuanjen, Huang Polly, Yao Jason J., Chen Homer H. Design and evaluation of a P2P IPTV system for heterogeneous networks. IEEE Transactions on Multimedia,9(8):1568-1579, December 2007.
    [10]Yongxiang Dou, Xiaoxian Bei. Ontology-based semantic information retrieval systems in unstructured P2P networks. International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008.
    [11]The Gnutella Protocol Specification v0.4.
    [12]Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F and Balakrishnan H. Chord:A Scalable Peer-to-peer Lookup Protocol for Internet Application. IEEE/ACM Transactions on Networking.11(1):17-32,2003.
    [13]Carchiolo Vincenza, Longheu Alessandro, Malgeri Michele, Mangioni Giuseppe. Advertising and discovering trusted resources within a P2P-based architecture. 9th IEEE International Conference on Advanced Learning Technologies (ICALT 2009). pp 109-111,2009.
    [14]Mande Xie, Guiyi Wei, Yun Ling. An exhaustive resource discovered method with probabilistic guarantees for P2P network. International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008.
    [15]Gatani Luca, Re Giuseppe Lo, Gaglio Salvatore. An adaptive routing mechanism for P2P resource discovery. IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2005).1:205-212,2005.
    [16]Gao Feng, Woodward M.E. A hybrid topological-stochastic partitioning method for scaling QoS routing algorithms. Computer Networks.51(6):1705-1724, April,2007.
    [17]Liang Zhengqiang, Shi Weisong. TRECON:A trust-based economic framework for efficient internet routing. IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.40(1):52-67, January 2010.
    [18]Deng Wenping, Zhu Peidong, Lu Xicheng, Plattner Bernhard. On evaluating BGP routing stress attack. Journal of Communications.5(1):13-22,2010.
    [19]Kvalbein Amund, Hansen Audun Fosselie, Cicic Tarik, Gjessing Stein, Lysne Olav. Multiple routing configurations for fast IP network recovery. IEEE/ACM Transactions on Networking.17(2):473-486,2009.
    [20]Ma Richard T. B., Lee C.M., Lui John C. S., Yau David K. Y. Incentive P2P networks:A protocol to encourage information sharing and contribution. Performance Evaluation Review. Special Issue on the Fifth Workshop on Mathematical performance Modeling and Analysis (MAMA 2003).31(2):23-25, September 2003.
    [21]Li Hua, Zhao JianPing. Security research on P2P network. International Conference on Computational Intelligence and Software Engineering (CiSE), 2009.
    [22]Min Yu, Zhanhuai Li, Longbo Zhang. Supporting complex query with structured overlays in schema-based P2P system. Lecture Notes in Computer Science, v 4256 LNCS.pp 115-121,2006.
    [23]Oliveira B, Siqueira G, Macedo F, et al. Evaluation of peer-to-peer network content discovery techniques over mobile Ad-hoc networks. Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WWMMN’05).2:51-56, June 2005.
    [24]http://www. dei.isep.ipp.pt/docs.arpa.html.
    [25]Usenet website:http://www.usenet.com.
    [26]Fasttrack website:http://www. fasttrackdcn.net.
    [27]Edonkey website:http://www. edonkey2000.com.
    [28]Emule website:http://www. emule-project.net.
    [29]Bittorrent website:http://bitconjurer.org/BitTorrent.
    [30]Wells R. C., Eaton P., Geels D., Zhao B., Weatherspoon H., Kubiatowicz J. Maintenance-free global data storage. IEEE Internet Computing. pp 40-49,2001.
    [31]Druschel P., Rowstron A. PAST: A large-scale, persistent peer-to-peer storage utility. HotOS VIII. Schoss Elmau, Germany. May 2001.
    [32]Groove website:http://groove.com.
    [33]Zaplet website:http://zaplet.com.
    [34]QQ website:http://www. qq.com.
    [35]MSN Messenger website:http://www. msn.com.
    [36]Skype website:http://www. Skype.com.
    [37]Zhang X., Liu J., Li B., Yum P. S. Cool Streaming/DONet: A data-driven overlay network for live media streaming. IEEE INFOCOM 2005.
    [38]SETI@home website:http://setiathome. Berkeley.edu/index.php.
    [39]David P. Anderson, Jeff Cobb, Eric Korpela, Matt Lebofsky, Kan Werthimer. SETI@home:An experiment in public-resource computing. Communications of the ACM,2002.
    [40]Folding@home website:http://folding. Stanford.edu.
    [41]Distributed.net website:http://distributed. Net.
    [42]B. Yang, H. Garcia-Molina. Efficient search in peer-to-peer networks. The 22nd IEEE International Conference on Distributed Computing Systems (ICDCS). July 2002.
    [43]http://P2P. internet2.edu.
    [44]王向辉,P2P网络拓扑结构研究,哈尔滨工程大学博士学位论文,2008.
    [45]JXME [EB/OL]:http://Jxme. Jxta.org.
    [46]JXTA [EB/OL]:http://www. jxta.org.
    [47]刘鑫.P2P网络移动Peer的JXME平台的研究和实现.上海.华东师范大学计算机应用技术,2003.
    [48]王五平.基于JXME的移动对等网络研究和MP2PChess的实现.复旦大学计算机应用技术,2004.
    [49]Lehtinen J. A. Design and implementation of mobile peer-to-peer application. Helsinki University,2006.
    [50]陈昱新ezBusiness:一个创新的移动式e化商业架构.台湾.国立台湾科技大学管理咨询系,2005.
    [51]Ding, B. Bhargava. Peer-to-peer file-sharing over mobile ad hoc networks. In Proceedings of IEEE Annual Conference on Pervasive Computing and Communications Workshops. pp 104-109, March 2004.
    [52]彭刚.MP2P环境中资源定位算法的研究.浙江.浙江大学计算机学院,2005.
    [53]程久军,李玉宏,程时端,马建.移动P2P系统体系结构与关键技术的研究.北京邮电大学学报.29(4):pp 86-89,2006.
    [54]刘越平.手持移动平台上对等信息共享系统的研究和实现.广州.华南理工大学计算机应用技术,2004.
    [55]李晓明.面向移动设备的P2P网络的安全改进.复旦大学计算机系统结构,2003.
    [56]http://www3.informatik.uni-wuerzburg.de.
    [57]Conti, E. Gregori, G. Turi. Towards scalable P2P computing for mobile ad hoc networks. In Proceedings of workshop on Mobile Peer-to-Peer computing (MP2P'O4), pp 109-113,2004.
    [1]Zhou Mo, Dai Yafei, Li Xiaoming. A measurement study of the structured overlay network in P2P file-sharing applications. 8th IEEE International Symposium on Multimedia (ISM 2006). pp 621-628,2006.
    [2]Chen Changsheng, Liu Tachung, Su Chunhsien. Exploring the correlation between P2P Applications and Network Architecture. International Conference on Advanced Communication Technology (ICACT).1:171-175,2009.
    [3]Sinnreich H. The challenge of P2P Internet communications to network based services. Elektrotechnik und Informationstechnik.123(7,8):277-282, July/ August 2006.
    [4]Walkerdine J., Hughes D., Rayson P., Simms J., Gilleade K., Mariani J., Sommerville I. A framework for P2P application development. Computer Communications.31(2):387-401, Febrary 2008
    [5]Naor Moni, Wieder Udi. Novel architectures for P2P applications:The continuous-discrete approach. ACM Transactions on Algorithms.3(3):221-235, August 2007.
    [6]Goel S. K., Singh M., Xu D., Li B. Efficient peer-to-peer data dissemination in mobile ad-hoc networks. In proceedings of International Conference on Parallel Processing Workshops. pp 152-158, August 2002.
    [7]Min Yu, Zhanhuai Li, Longbo Zhang. Supporting complex query with structured overlays in schema-based P2P system. Lecture Notes in Computer Science, v 4256 LNCS.pp 115-121,2006.
    [8]Hung Nguyen Chan, Khang Nguyen Van, Giang Ngo Hoang. Characterizing Chord, Kelips and Tapestry algorithms in P2P streaming applications over wireless network. 2nd International Conference on Communications and Electronics (HUT-ICCE 2008). pp 126-131,2008.
    [9]Schollmeier R, Gruber I, Niethammer F. Protocol for peer-to-peer networking in mobile environments. In: Proceedings of 12th IEEE International Conference on Computer Communications and Networks. pp 765-769, Dallas, USA,2003.
    [10]Gruber I, Schollmeier R, Kellerer W. Performance evaluation of the mobile peer-to-peer protocol. In:Proceedings of Fourth International Workshop on Global and Peer-to-Peer Computing. pp 512-518,2004.
    [11]Kvalbein Amund, Hansen Audun Fosselie, Cicic Tarik, Gjessing Stein, Lysne Olav. Multiple routing configurations for fast IP network recovery. IEEE/ACM Transactions on Networking.17(2):473-486,2009.
    [12]Roczniak Andrew, Saddik Abdulmotaleb El. Improving robustness of P2P applications in mobile environments. Peer-to-Peer Networking and Applications. 2(3):217-229,2009.
    [13]Hu Yi, Feng Min, Bhuyan Laxmi N., Kalogeraki Vana. Budget-based self-optimized incentive search in unstructured P2P networks. IEEE INFOCOM. 2009.
    [14]Robles Rosslin John, Choi Min-Kyu, Cho Eun-Suk. A paradigm solution to P2P security issues. International e-Conference on Advanced Science and Technology (AST), pp 3-7,2009.
    [15]Walkerdine J., Hughes D., Rayson P., Simms J., Gilleade K., Mariani J., Sommerville I. A framework for P2P application development. Computer Communications.31(2):387-401, Febrary 2008.
    [16]任浩.P2P覆盖网拓扑优化技术研究.国防科技大学博士学位论文.2007.
    [17]Napster website:http://www.napster.com.
    [18]Bittorrent protocol specification: http://bitconjurer.org/BitTorrent/protocol.html.
    [19]Gao Lei, Zeng Guangzhou. An innovative hybrid P2P location network for P2P workflow systems. Proceedings of the 2009 International Conference on Communication Software and Networks (ICCSN 2009). pp 61-65,2009.
    [20]Gu Tao, Pung Hung Keng, Zhang Daqing. A semantic P2P framework for building context-aware applications in multiple smart spaces. Lecture Notes in Computer Science on Embedded and Ubiquitous Computing - International Conference (EUC 2007). pp 553-564,2007.
    [21]KaZaA website:http://www. kazaa.com.
    [22]Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F and Balakrishnan H. Chord:A Scalable Peer-to-peer Lookup Protocol for Internet Application. IEEE/ACM Transactions on Networking.11(1):17-32.2003.
    [23]The Gnutella Protocol Specification v0.4.
    [24]Ratnasamy S., Shenker S., Stoica I. Routing algorithm for DHTs:some open questions. lsth International Workshop on Peer-to-Peer System (IPTPS'02), 2002.
    [25]Lin Ching-Ju, Chang Yi-Ting, Tsai Shuo-Chan, Chou Cheng-Fu. Distributed social-based overlay adaptation for unstructured P2P networks. IEEE Global Internet Symposium.2007
    [26]Ratnasamy S, Francis P, Handley M, Karp R, Shenker S. A scalable content addressable network. Conference of Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM 2001). pp 161-172, 2001.
    [27]Rowstron A, Druschel P. Pastry:Scalable, decentralized object location and routing for large scale peer-to-peer systems. International Conference on Distributed System Platforms (Middleware) 2001.
    [28]Ben Zhao, John Kubiatowicz, Anthony Joseph. Tapestry:An infrastructure for fault-tolerant wide-wide location and routing. Technical Report, U. C. Berkeley 2001.
    [29]Gnutella website:http://www. gnutella.co.uk/.
    [30]Christos Gkantsidis, Milena Mihail, Amin Saberi. Random walks in peer-to-peer networks. IEEE INFOCOM 2004.
    [31]Boyd S., Ghosh A., Prabhakar B., Shah D. Gossip algorithms:Design, analysis and applications. IEEE INFOCOM 2005.
    [32]Yang B., Garcia-Molina H.. Efficient search in peer-to-peer networks. 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), July 2002.
    [33]Christos Gkantsidis, Milena Mihail, Amin Saberi. Random walks in peer-to-peer networks. IEEE INFOCOM 2004.
    [34]Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenker. Search and replication in unstructured peer-to-peer networks.16th ACM International Conference on Supercomputing (ICS'02), June 2002.
    [35]Plaxton C. C., Rajaraman R., Richa A. W. Accessing nearby copies of replicated objects in a distributed environment. In Proceedings of ACM Symposium on Parallel Algorithms and Architectures,1997.
    [36]Zhao B. Y, Kubiatowicz J., Joseph A. D. Tapestry:an infrastructure for fault-tolerant wide-area location and routing. Technical Report No. UCB/CSD-01-1141, University of California Berkeley,2001.
    [37]Rowstron A., Druschel P. Pastry:scalable, decentralized object location and routing for large-scale peer-to-peer systems. In proceedings of IFIP/ACM International Conference on Distributed Systems Platforms,2001.
    [38]Ratnasamy S., Francis P., Handley M., et al. A scalable content-addressable network. In Proceedings of ACM STGCOMM2001, USA,2001.
    [39]Maymounkov P., Mazieres D. Kademlia: a peer-to-peer information system based on the XOR metric. In Proceedings of IPTPS,2002.
    [40]Malkhi D., Naor M., Ratajczak D. Viceroy:a scalable and dynamic emulation of the butterfly. In Proceedings of Principles of Distributed Computing. pp 183-192, 2002.
    [41]Liu Shuping, Jiang Weirong, Li Jinpei. Architecture and performance evaluation for P2P application in 3 G mobile cellular systems. International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). pp 914-917,2007.
    [42]Oliveira B, Siqueira G, Macedo F, et al. Evaluation of peer-to-peer network content discovery techniques over mobile Ad-hoc networks. Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WWMMN'05).2:pp 51-56,2005.
    [43]Kolberg Mario, Wilson Michael, Blunn Martin, Magill Evan, Burtwistle Peter. A framework for mobile applications based on a structured P2P overlay.6th IEEE Consumer Communications and Networking Conference (CCNC 2009),2009.
    [44]Delmastro Franca, Passarella Andrea, Conti Marco. P2P multicast for pervasive ad hoc networks. Pervasive and Mobile Computing.4(1):62-91, February 2008.
    [45]谢希仁.计算机网络(第5版).电子工业出版社.2008.1.
    [46]Li Ting, Ji Hong, Mei Jingqing, Li, Yi, Hu Chao. Topology mismatch avoidable cross-layer protocol for P2P file discovery in MANETs. IEEE Wireless Communications and Networking Conference (WCNC),2009.
    [47]Adar B Huberman. Free riding on Gnutella. Technical Report, Xerox PARC. August 2000.
    [48]Philippe Golle, Kevin Leyton-Brown, Ilya Mironov. Incentive for sharing in peer-to-peer networks. In Proceedings of the 3rd ACM Conference on Electronic Commerce. pp 264-267,2003.
    [49]Chiranjecb Buragohain, Divyakant Agrawal, Subhash Suri. A game theoretic framework for incentives in P2P systems. P2P 2003.
    [50]Richard TB Ma, Sam CM Lee, John CS Lui, David KY Yau. A game theoretic approach to provide incentive and service differentiation in P2P networks. SIGMETERICS 2004.
    [51]Harren M., Hellerstein J., Huebsch R., Loo B., Shenker S., Stoica I.. Complex queries in DHT-based peer-to-peer networks. In Proceedings of IPTPS 2002.
    [52]Tang C., Xu Z., Dwarkadas S. Peer-to-peer information retrieval using self-organizing semantic overlay networks. In Proceedings of ACM SIGCOMM 2003.
    [53]Reynolds P., Vahdat A. Efficient peer-to-peer keyword searching. In Proceedings of Middleware 2003.
    [54]http://www.zeropaid.Com/bbs/archive/index.php/t-6928.
    [55]Arturo Crespo, Hector Garcia-Molina. Semantic overlay ntworks for P2P systems. Technical Report, Stanford University, January 2003.
    [56]Huo Ying, Chen Zhigang. Searching scheme in P2P system based on semantic overlay network. Journal of Southeast University (English Edition).22(3): 330-333, September 2006.
    [57]Ejdl N., Olpers W. M., Iberski W. S. Semantic peer-to-peer search using query expansion. In Proceedings of SemPGRID 2004.
    [58]孟春.移动P2P数据分发技术研究.北京邮电大学硕士学位论文.2009.
    [59]Marques Antonio, Da Silva Fernando Mira, Rocha Rui. P2P over mobile ad-hoc networks. The 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, SECON Workshops 2009.
    [60]Hwang Renhung, Hoh Chengchang. Cross-layer design of P2P file sharing over mobile ad hoc networks. Telecommunication Systems.42(1-2):47-61, October 2009.
    [61]Park Karam, Park Joon-Sang, Ro Won W. Efficient parallelized network coding for P2P file sharing applications. Lecture Notes in Computer Science on Advances in Grid and Pervasive Computing - 4th International Conference, GPC 2009.5529:353-363,2009.
    [62]Nemati Alireza Goudarzi, Enokido Tomoya, Takizawa Makoto. A multi-source streaming model for mobile peer-to-peer (P2P) overlay networks. In Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS Workshops 2008). pp 18-23,2008.
    [63]Zhang Qiang, Xue Huifeng, Kou Xiaodong. An evolutionary game model of resources-sharing mechanism in P2P networks. In Proceedings of Workshop on Intelligent Information Technology Application (IITA 2007). pp 282-285,2007.
    [64]Keralapura Ram, Nucci Antonio, Chuah Chennee. A novel self-learning architecture for p2p traffic classification in high speed networks. Computer Networks.54(7):1055-1068, May 17,2010.
    [65]Deng Yuhui, Wang Frank, Ciura Adrian. Ant colony optimization inspired resource discovery in P2P Grid systems. Journal of Supercomputing.49(1):4-21, July 2009.
    [66]Wang Wei, Zeng Guosun, Yuan Lulai. Ant-based reputation evidence distribution in P2P networks. In Proceedings of 5th International Conference on Grid and Cooperative Computing (GCC 2006). pp 129-132,2006.
    [1]Balakrishnan H, Kaashoek F, Karger D. Looking up data in P2P systems. Communications of the ACM.46(2):43-8,2003.
    [2]Oliveira B, Siqueira G, Macedo F, et al. Evaluation of peer-to-peer network content discovery techniques over mobile Ad-hoc networks. Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WWMMN'05).2:51-56, June 2005.
    [3]Peng G, Li S P, Jin H R, et al. M-CAN:a lookup protocol for mobile peer-to-peer environment. In Proceedings of 7th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN'04).1:544-549, May 2004.
    [4]Conti M, Gregori E, Turi G. A cross-layer optimization of Gnutella for mobile Ad-hoc networks. In Proceedings of 6th ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc'05).1:343-354, May 2005.
    [5]Yu Dan, Chen Xinmeng, Chang Yunlei. An improved P2P model based on chord. Parallel and Distributed Computing, Applications and Technologies (PDCAT). pp 807-810,2005.
    [6]Cheliang Liu, Chihyu Wang, Hungyu Wei. Mobile Chord: Enhancing P2P application performance over vehicular ad hoc network. IEEE Globecom Workshops 2008.
    [7]Qi Zhao, Jiaoyao Liu, Jingdong Xu. Improving search on gnutella-like P2P systems. Lecture Notes in Computer Science on 7th International Conference Computational Science (ICCS 2007). pp 877-880,2007.
    [8]Abada A, Li C, Huang C C, et al. A novel path selection and recovery mechanism for MANETs P2P file sharing applications. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC'07).1: 3472-3477, March 2007.
    [9]Wang Z, Bhulawala V. A P2P cooperative proxy cache system for wireless base stations. Proceedings of IEEE Wireless Networks, Communications and Mobile Computing (WNCMC'05).2:1148-1153. June 2005.
    [10]Leong P, Miao C, Lim B, et al. Agent mediated peer-to-peer mobile service-oriented architecture. Proceedings of Digital EcoSystems and Technologies Conference (DEST'07).1:414-419, Feburary 2007.
    [11]Zhang Qiang, Xue Huifeng, Kou Xiaodong. An evolutionary game model of resources-sharing mechanism in P2P networks. In Proceedings of Workshop on Intelligent Information Technology Application (IITA 2007). pp 282-285,2007.
    [12]Deng Yuhui, Wang Frank, Ciura Adrian. Ant colony optimization inspired resource discovery in P2P Grid systems. Journal of Supercomputing.49(1):4-21, July 2009.
    [13]Jovanovic M. Modeling large-scale peer-to-peer networks and a case study of Gnutella. Ohio, USA:University of Cincinnati,2001.
    [14]Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the internet topology. Proceedings of ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM’99).1:251-262, August 1999.
    [15]Watts D J, Strogatz S H. Collective Dynamics of Small-world Networks. Nature. 393(4):440-442P,1998.
    [16]Newman M E J, Watts D J. Scaling and Percolation in the Small-world Network Model. Physical Review.60(6):7332-7342P,1999.
    [17]Ozik J, Hunt B R, Ott E. Growing Networks with Geographical Attachment Preference: Emergence of Small Worlds. Physical Review.69(2):1081-1085, 2004.
    [18]Zhang Z, Zhou S, Shen Z, et al. Form Regular to Growing Small-world Networks. Physical Review.385:765-772P,2007.
    [19]Gupta A, Liskov B, Rodrigues R. One hop lookups for peer-to-peer overlays. Proceedings of 9th Conference on Hot Topics in Operating Systems (HotOS IX'03).1:551-553, May 2003.
    [20]Matei R, Iamnitchi A, Foster P. Mapping the Gnutella network. IEEE Internet Computing.6(1):50-57,2002.
    [1]Oliveira B, Siqueira G, Macedo F, Loureiro F, Nogueira M, Hao W. Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks. In:Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks. pp 51-56,2003.
    [2]Peng G, Li S P, Jin H R, et al. M-CAN:a lookup protocol for mobile peer-to-peer environment. In: Proceedings of 7th International Symposium on Parallel Architectures, Algorithms and Networks. pp 544-549,2004.
    [3]Leong P, Miao C, Lim B, et al. Agent mediated peer-to-peer mobile service-oriented architecture. In:Proceedings of Digital EcoSystems and Technologies Conference. pp 414-419,2007.
    [4]Li Chunxi, Chen Changjia. Measurement-based study on the relation between users watching behavior and network sharing in P2P VoD systems. Computer Networks.54(1):13-27, January 2010.
    [5]Hu Yan, Chiu Dahming, Lui John C.S. Profiling and identification of P2P traffic. Computer Networks.53(6):849-863, April 2009.
    [6]Ruta Michele, Noia Tommaso Di, Sciascio Eugenio Di, Scioscia Floriano. Abduction and contraction for semantic-based mobile dating in P2P environments. In Proceedings of International Conference on Web Intelligence (WI). pp 626-632,2008.
    [7]Enokido Tomoya, Takizawa Makoto, Goudarzi Nemati Alireza. Models for P2P multi-source streaming. In Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems (CISIS). pp 35-42,2009.
    [8]Couto Da Silva Ana Paula, Rodriguez-Bocca Pablo, Rubino Gerardo. Optimal quality-of-experience design for a P2P multi-source video streaming. IEEE International Conference on Communications (ICC). pp 22-26,2008.
    [9]Han Jung-Suk, Song, Jin-Woo, Kim Taek-Hun, Yang Song-Bong. Double-layered mobile P2P systems using energy-efficient routing schemes. In Proceedings of Australasian Telecommunication Networks and Applications Conference (ATNAC). pp 122-127,2008.
    [10]Wang Qiang, Daudjee Khuzaima, Tamer Ozsu M. Popularity-aware prefetch in P2P range caching. In Proceedings of the 8th International Conference on Peer-to-Peer Computing (P2P08). pp 53-62,2008.
    [11]Stacey Paul, Berry Damon, Coyle Eugene. Using structured P2P overlay networks to build content sensitive communities. In Proceedings of the International Conference on Parallel and Distributed Systems (ICPADS).10: 281-288,2004.
    [12]Kabatake Koji, Tagashira Shigeaki, Fujita Satoshi. Efficient support of conjunctive queries in P2P DHT by using bloom filter. In Proceedings of the International Conference on Parallel and Distributed Computing and Systems (PDCS). pp 202-207,2006.
    [13]Gruber I, Schollmeier R, Kellerer W. Performance evaluation of the mobile peer-to-peer protocol. In:Proceedings of Fourth International Workshop on Global and Peer-to-Peer Computing. pp 512-518,2004.
    [14]Schollmeier R, Gruber I, Niethammer F. Protocol for peer-to-peer networking in mobile environments. In: Proceedings of 12th IEEE International Conference on Computer Communications and Networks. pp 765-769,2003.
    [15]Klemm A, Lindemann C, Waldhorst 0. A special-purpose peer-to-peer file sharing system for mobile Ad Hoc networks. In: Proceedings of IEEE Semiannual Vehicular Technology Conference, Orlando. pp 455-460,2003.
    [16]Abada A, Li C, Huang C C, et al. A novel path selection and recovery mechanism for MANETs P2P file sharing applications. In: Proceedings of IEEE Wireless Communications and Networking Conference. pp 3472-3477,2007.
    [17]Ponmozhi K., Rajesh Reader R.S. Applying P2P in MANETs for resource sharing. International Conference on Control Automation, Communication and Energy Conservation (INCACEC).2009.
    [18]Kosko B. Fuzzy knowledge combination. International Journal of Intelligent Systems.1:293-320,1986.
    [19]Hentschel Marco, Li Maozhen, Ponraj Mahesh, Qi Man. Distributed indexing for resource discovery in P2P networks. The 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID 2009). pp 550-555, 2009.
    [20]Park Jun-Cheol, Yu Geonu. Securing overlay activities of peers in unstructured P2P networks. International Conference on Computational Intelligence and Security (ICCIAS).2:1105-1108,2006.
    [21]Mawji Afzal, Hassanein Hossam. Incentives for P2P file sharing in mobile ad hoc networks. The 6th IEEE Consumer Communications and Networking Conference (CCNC 2009).2009.
    [22]Bellman R, Zadeh L. Decision making in a fuzzy environment. Management Science.17:141-164,1970.
    [23]Guo H B, Kuo G S. A dynamic and adaptive bandwidth management scheme for QoS support in wireless multimedia networks. In: Proceedings of IEEE Semiannual Vehicular Technology Conference. pp 2081-2085,2005.
    [24]Li Y J, Wu H Y, Zeng N F, et al. MAC-SCC:a medium access control protocol with separate control channel for reconfigurable multi-hop wireless networks. IEEE Transactions on Wireless Communications.5(7):1805-1817,2006.
    [1]Rahman Md. Mustafizur, Hong Choong Seon, Lee Sungwon. A high throughput on-demand routing protocol for multirate ad hoc wireless networks. IEICE Transactions on Communications. E93-B(1):29-39,2010.
    [2]Xu Hui, Wu Xianren, Sadjadpour Hamid R., Garcia-Luna-Aceves J.J. A unified analysis of routing protocols in MANETs. IEEE Transactions on Communications.58(3):911-922, March 2010.
    [3]Dabideen Stephen, Smith Bradley R., Garcia-Luna-Aceves J.J. An end-to-end approach to secure routing in MANETs. Security and Communication Networks. 3(2-3):130-149, March - June 2010.
    [4]Walkerdine J., Hughes D., Rayson P., Simms J., Gilleade K., Mariani J., and Sommerville I. A framework for P2P application development. Computer Communications.31(2):387-401, Feburary 2008.
    [5]Oliveira L. B., Siqueira I. G., Macedo D. F., Loureiro A. A. F., Hao Chi W., Nogueira J. M. Evaluation of peer-to-peer network content discovery techniques over mobile ad hoc networks. The 6th IEEE Int'l Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM). June 2005.
    [6]Karydis I., Nanopoulos A., Papadopoulos A., Katsaros D., Manolopoulos Y. Music retrieval over wireless ad-hoc networks. IEEE Transactions on Audio, Speech, and Language Processing.16(6):1152-1162, August 2008.
    [7]Meng G., Ammar M., Zequra E. Cooperative patching:a client based P2P architecture for supporting continuous live video streaming. The 13th International Conference on Computer Communications and Networks (ICCCN). October 2004.
    [8]Kawamura T., Sugahara K., Kinoshita S., Nakatani R., Motomura S. Backup and recovery scheme for multi-agent-based e-learning system. The International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS). May 2007.
    [9]Gabriele M., Gianluca M., Sstefano L. W-Grid: a robust decentralized cross-layer infrastructure for routing and multi-dimensional data management in wireless Ad-Hoc sensor networks. The 7th IEEE International Conference on Peer-to-Peer Computing (P2P). September 2007.
    [10]Sanigepalli P., Kalva H., Furht B. Using P2P networks for error recovery in MBMS applications. The IEEE International Conference on Multimedia and Exop. July 2006.
    [11]Kosko B. Fuzzy cognitive maps. International Journal of Man-Machine Studies. 24:65-75,1986.
    [12]Niskanen V. Application of fuzzy linguistic cognitive maps to prisoner's dilemma. Int'l Journal of Innovative Computing, Information and Control.2(1): 139-152, Feburay 2006.
    [13]Wang Shu, Chen Changjia. Backup routing for BGP:Virtual ring routing scheme. In Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT). pp 603-607,2009.
    [14]Manssour Jawad, Osseiran Afif, Slimane Slimane Ben. Wireless network coding in multi-cell networks: Analysis and performance.2nd International Conference on Signal Processing and Communication Systems (ICSPCS),2008.
    [15]Kannan Rajgopal, Wei Shuangqing, Chakravarthy Vasu,Rangaswamy Muralidhar. Approximation algorithms for minimum energy transmission scheduling in rate and duty-cycle constrained wireless networks. IEEE/ACM Transactions on Networking.18(1):296-306, February 2010.
    [16]Moser Clemens, Thiele Lothar, Brunelli Davide, Benini Luca. Adaptive power management for environmentally powered systems. IEEE Transactions on Computers.59(4):478-491,2010.
    [17]Qian Hongyan, Chen Bing, Qin Xiaolin. A novel mobility management protocol supporting network seamless roaming. Journal of Networks.5(3):367-374, March 2010.
    [18]Chen Chihming, Chen Yungchang, Lin Chiawen. Seamless roaming in wireless networks for video streaming. In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS). pp 3255-3258,2005.
    [19]Heather Yu, Buford John, Merabti Madjid. Improving messaging security in structured P2P overlay networks. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo (ICME). pp 408-411,2007.
    [20]Wang Xiaoming. A secure admission control scheme for P2P networks.International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM).2006.
    [21]Zheng Jialing, Ma Maode. QoS-aware cooperative medium access control for MIMO ad-hoc networks. IEEE Communications Letters.14(1):48-50, January 2010.
    [22]Sadek Ahmed K., Han Zhu, Liu K. J. Ray. Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks. IEEE Transactions on Mobile Computing.9(4):505-515, April 2010.
    [23]Ikki Salama S., Ahmed Mohamed H. Performance analysis of adaptive decode-and-forward cooperative diversity networks with best-relay selection. IEEE Transactions on Communications.58(1):68-72, January 2010.
    [24]Butler Kevin R.B., Ryu Sunam, Traynor Patrick, McDaniel Patrick D. Leveraging identity-based cryptography for node ID assignment in structured P2P systems. IEEE Transactions on Parallel and Distributed Systems.20(12): 1803-1815, December 2009.
    [25]Gupta A., Liskov B., Rodrigues R. One hop lookups for peer-to-peer overlays. The 9th Int'l Conference on Hot Topics in Operating Systems (HotOS). May 2003.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700